IWSEC 2018

September 3rd (Mon) - September 5th (Wed), 2018
Sendai, Japan

List of Posters

Best Poster Awards

  • Study of Security Risk of Cryptocurrency Exchange Service
    Daisuke Kito and Yoshiaki Isobe (Hitachi, Ltd.)
  • White-box Attack on Google Machine Learning System
    Dang Duy Thang and Toshihiro Matsui (Institute of Information Security)
  • A Case Study of Row Hammer under Different Refresh Rates
    Erina Tatsumi, Kazuo Sakiyama and Takeshi Sugawara(The University of Electro-Communications)
  • Alexa, Renew the Public Key and the Certificate (of Your TLS Sites)
    Yuji Suga (Internet Initiative Japan Inc.)

IWSEC 2018 List of Posters

  1. Multiparty Key Agreement Scheme Using Partially Leaked Key Exchange Graphs
    Bateh Mathias Agbor, Tatsuya Sasaki, Yu-ichi Hayashi, Takaaki Mizuki and Hideaki Sone (Tohoku University)
  2. Recovering CRT-RSA Secret Keys from Noisy Square-and-Multiply Sequences in Sliding Window Method
    Kento Oonishi and Noboru Kunihiro (The University of Tokyo)
  3. An Efficient Implementation of Whitelist-based XSS Attack Detection
    Keisuke Inoue, Toshiki Honda, Kohei Mukaiyama, Tetsushi Ohki, and Masakatsu Nishigaki (Shizuoka University)
  4. Key-updatable Public-key Encryption with Keyword Search : An Efficient Construction
    Hiroaki Anada (University of Nagasaki), Akira Kanaoka (Toho University), Natsume Matsuzaki (University of Nagasaki) and Yohei Watanabe (The University of Electro-Communications)
  5. Detection of JavaScript-based Attacks Using Doc2Vec Feature Learning
    Samuel Ndichu, Sangwook Kim, Seiichi Ozawa (Kobe University), Misu Takeshi and Kazuo Makishima (SecureBrain Corporation)
  6. LPS-type Ramanujan Graphs
    Yoshinori Yamasaki (Ehime University) and Hyungrok Jo (The University of Tokyo)
  7. Study of Security Risk of Cryptocurrency Exchange Service
    Daisuke Kito and Yoshiaki Isobe (Hitachi, Ltd.)
  8. A Continuous Genetic Algorithm for Optimizing Pruning Function for Lattice Enumeration
    Trong-Thuc Trang (Kyushu University), Yoshinori Aono (National Institute of Information and Communications Technology) and Tsuyoshi Takagi (The University of Tokyo)
  9. Proposal of a Method to Generate Features of Unknown Data from Observation Data and Its Possibility
    Takeshi Matsuda (University of Nagasaki), Michio Sonoda (National Institute of Information and Communications Technology), Ryutaro Ushigome and Takeru Araki (Chuo University)
  10. Proposal and Evaluation of Personal Authentication Method Combining Mouse Operation and Number Plate
    Kensuke Sakamoto, Makoto Nagatomo (Kanagawa Institute of Technology), Naonobu Okazaki (University of Miyazaki) and Mirang Park (Kanagawa Institute of Technology)
  11. A Study on Smart Lock Authentication Using Smart Phone and Wearable Device Acceleration Sensor
    Kazuki Watanabe, Makoto Nagatomo (Kanagawa Institute of Technology), Kentaro Aburada, Naonobu Okazaki (University of Miyazaki) and Mirang Park (Kanagawa Institute of Technology)
  12. Portable Implementation of Discrete Gaussian Sampling on JavaScript-enabled Platforms
    Junting Xiao, Ye Yuan (Kyushu University), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Labs.) and Tsuyoshi Takagi (The University of Tokyo / Kyushu University)
  13. Extended Partial Key Exposure Attack on RSA
    Kaichi Suzuki, Atsushi Takayasu and Noboru Kunihiro (The University of Tokyo)
  14. White-box Attack on Google Machine Learning System
    Dang Duy Thang and Toshihiro Matsui (Institute of Information Security)
  15. Estimating Secure Parameters for EFCp
    Yacheng Wang, Yasuhiko Ikematsu and Tsuyoshi Takagi (The University of Tokyo)
  16. Analyzing the Sparsification Attack on LWE
    Yuntao Wang (The University of Tokyo), Thomas Wunderer (Technical University of Darmstadt) and Tsuyoshi Takagi(The University of Tokyo)
  17. A Proposal of Authorization Framework for Nested Web API Call
    Bintatsu Noda and Hisashi Kojima (Fujitsu Laboratories Ltd.)
  18. Initial Consideration on Human Factor in Security Incident
    Seiko Myojin and Noboru Babaguchi (Osaka University)
  19. A Case Study of Row Hammer under Different Refresh Rates
    Erina Tatsumi, Kazuo Sakiyama and Takeshi Sugawara(The University of Electro-Communications)
  20. A Study on Distributed Cooperative & Multi-Layered Security Analysis Platform for Autonomous Mobility Systems
    Takafumi Harada and Tomoaki Washio (NTT Secure Platform Laboratories)
  21. Privacy-Preserving Naive Bayes Classifier based on Homomorphic Encryption
    Sangwook Kim, Toshiaki Omori, Masahiro Omori (Kobe University), Takuya Hayashi (National Institute of Information and Communications Technology), Lihua Wang and Seiichi Ozawa (Kobe University)
  22. Theory and Applications of Encrypted Control Systems for Cyber Security
    Rikuna Baba, Kiminao Kogiso, Osamu Kaneko (The University of Electro-Communications), Masako Kishida (National Institute of Informatics) and Kenji Sawada (The University of Electro-Communications)
  23. Alexa, Renew the Public Key and the Certificate (of Your TLS Sites)
    Yuji Suga (Internet Initiative Japan Inc.)
  24. On AND/OR Composition of the ZKBoo Protocols
    Hiroaki Anada (University of Nagasaki)

* Underlined authors are presenters.

Some poster presenters published their poster document on their will at this page. The documents are only available one week before and after the workshop date.
Every uploaded document regarding the posters is POSTER AUTHORS RESPONSIBILITY. IWSEC2018 accept no responsibility and no liability for any loss resulting from the published documents. IWSEC2018 does not endorses documents that violates any law or infringes the rights.

Remarks

Posters were not rigorously refereed, and no proceedings were published regarding the posters, and hence the copyrights of any content for the poster presentations are retained by the authors; there is no restriction for the authors of the posters to submit the contents to other journals/conferences in the future.